Latest Technology News

System76 Oryx Pro gets Intel Core i7-12700H and GeForce RTX 3070/3080 Ti

If you want a thin and light Linux laptop, there are plenty of options on the market these days, including the excellent HP Dev One. A svelte laptop is ideal for those that travel often and highly value having something lightweight.

Some consumers, however, don't care about the heft of a Linux laptop at all. These performance-junkies want hardcore specifications... weight be damned! For these folks, the System76 Oryx Pro has long been an excellent option. This hefty portable workstation is a great choice for both gamers and enthusiasts.

Continue reading

Dell XPS Plus 13 Developer Edition is certified for Ubuntu Linux 22.04 LTS

Earlier this year, HP made waves in the Linux community by partnering with System76 on a developer-focused laptop. Called "Dev One," the notebook comes pre-loaded with the Ubuntu-based Pop!_OS. This new HP machine is quite impressive, as you can read in our review.

Of course, seasoned Linux veterans were already familiar with a different major computer manufacturer selling a Linux-based developer machine. Yes, Dell has been releasing XPS "Developer Edition" models for many years -- these computers come with Canonical's Ubuntu pre-installed. Dell's XPS 13 in particular has been lauded by professional reviewers and consumers alike thanks to its balance of power and elegance.

Continue reading

Microsoft releases Windows 11 Build 25163 with taskbar overflow and sharing improvements

Windows 11 laptop

Happy Wednesday. It’s that day of the week when Microsoft typically rolls out a new Windows 11 build for Insiders in the Dev Channel. Sometimes these builds are interesting, with new features and the like, and other times they only contain a bunch of fixes.

The latest flight, Build 25163, falls into the former category, with some new additions which include a taskbar overflow experience and some improvements to file sharing.

Continue reading

TP-Link Archer AXE75 AXE5400 Tri-Band Wi-Fi 6E router is shockingly affordable

Being an early adopter can be expensive, right? Absolutely. Wi-Fi 6E with its 6Ghz band is the latest and greatest Wi-Fi standard, right? Correct. And so, buying a Wi-Fi 6E router must be a pricey affair, right? Actually, no. Not anymore.

Today, TP-Link launches the Archer AXE75 -- a beautiful AXE5400 Tri-Band Wi-Fi 6E router. While you'd expect it to be priced quite high, it actually costs a penny less than $200. For a limited time, however, TP-Link is offering an Amazon coupon that drops the price to only $169.99! Yes, that price is absolutely crazy for such a cutting-edge router.

Continue reading

IT and security leaders lack confidence in their ability to protect the cloud

Cloud data security

A new study from secure access specialist Appgate based on research by the Ponemon Institute finds 60 percent of IT and security leaders are not confident in their organization's ability to ensure secure cloud access.

The survey of nearly 1,500 IT decision makers and security professionals worldwide sets out to examine the pain points experienced in securing cloud environments and how zero trust security methods can enable digital transformation.

Continue reading

Get 'Efficiency Best Practices for Microsoft 365' ($28.99 value) FREE for a limited time

Efficiency Best Practices for Microsoft 365 covers the entire range of over 25 desktop and mobile applications on the Microsoft 365 platform.

This book will provide simple, immediately usable, and authoritative guidance to help you save at least 20 minutes every day, advance in your career, and achieve business growth. You'll start by covering components and tasks such as creating and storing files and then move on to data management and data analysis.

Continue reading

Almost half of organizations suffer voice network attacks

A new survey shows that 47 percent of organizations have experienced a vishing (voice phishing) or social engineering attack via their voice networks in the past year.

The study by voice traffic protection specialist Mutare also finds most are unaware of the volume of unwanted phone calls traversing their network, or the significance of threats lurking in unwanted traffic, which includes robocalls, spoof calls, scam calls, spam calls, spam storms, vishing, smishing and social engineering.

Continue reading

Quantum computing and its impact on cybersecurity [Q&A]

quantum computing

Quantum computing with its vastly improved processing capability offers the chance of many positive developments in research and science. But it also represents a potential threat to our current encryption models.

How big is quantum's threat to cybersecurity? And should we be taking action on this now? We talked to Skip Sanzeri, QuSecure co-founder and COO, to find out.

Continue reading

Google Play to allow app developers to use alternative billing systems in Europe

Dark Google

Google has announced that app developers in Europe -- and only Europe -- will be able to implement alternative billing systems for apps and games listed in Google Play.

On top of this, the company says that although any developer that does choose to use a different billing system will still be required to pay a service fee, it will be a reduced fee. The changes are in response to the recent Digital Markets Act.

Continue reading

There is a huge problem with Netflix's ad-supported subscription tier -- and it's not the ads

Bored watching TV

We've known for a little while that there was a cheaper subscription tier coming to Netflix. We have also been aware that the price to pay for a reduction in price is the requirement to view ads -- Netflix has teamed up with Microsoft as its advertising partner.

But the inclusion of ads is not the only downside to the cheaper tier. Netflix has now revealed that ad-supported subscriptions will not be able to access all of its video content.

Continue reading

Netflix has found a way to get money out of users who share passwords

Netflix logo and remote control

Netflix has been battling dropping subscriber numbers for a while, and the company has been looking for ways to either recoup the money lost through a shrinking userbase, or to increase the number of people willing to pay for access.

To provide a cheaper point of entry, Netflix has plans to introduce a lower-cost, ad-supported subscription tier, but the company has also talked about clamping down on people who share passwords and access to their account with friends. And with the newly announced "extra home" option, we've finally learned just how this is going to work.

Continue reading

Ultimate Ears UE DROPS are custom-molded Bluetooth wireless earbuds

So, here's the deal, folks -- everybody is physically different, and that's a good thing. Everyone is special in their own way. For instance, there are many different body types -- some people are short, while others are tall. Some people are fat, while others are thin. And of course, there are many body types in-between. Plus, there are different skin colors, hair types, and more. Not to mention, there are the two genders -- male and female. All are beautiful.

So with so many people having different physical characteristics, how can headphone companies expect earbuds to meet the needs of all ear sizes? Even with several earbud tip sizes included in the box, some people will still find they can never truly find the perfect fit. To remedy this issue, some manufacturers offer custom-molded earbuds that are designed for a specific "earprint." Today, the popular maker of audio gear, Ultimate Ears, launches just such a new product called "UE DROPS."

Continue reading

More than half of enterprises worried about supply chain risks

Software supply chain risk has become mainstream, with 52 percent of respondents to a new survey being concerned about it.

The study from cybersecurity company Coalfire also finds 50 percent of boards of directors with software-buying companies are raising concerns, which means that responsibility for software supply chain risk is no longer confined to technical teams.

Continue reading

Research reveals weaknesses in five popular web services

New research from Specops Software finds major cybersecurity weaknesses in popular web services including Shopify, Zendesk, Trello, and Stack Overflow.

The study shows several popular business web applications have failed to implement critical password and authentication requirements to protect customers from cybercrime.

Continue reading

Average cost of a data breach increases by 16 percent

A new report released today by ForgeRock shows the average cost of a breach in the US has increased by 16 percent to $9.5m, making the US the costliest place in the world to recover from a breach.

It also reveals a massive 297 percent surge in breaches caused primarily by security issues associated with supply chain and third-party suppliers and representing almost 25 percent of all breaches.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.